Search Results - (( developing code optimization algorithm ) OR ( java model encryption algorithm ))
Search alternatives:
- code optimization »
- model encryption »
- developing code »
- java model »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
3
Provider independent cryptographic tools
Published 2003“…The library consists of cryptographic algorithms that include symmetric and asymmetric encryptions, key exchange, hashing algorithms and digital signature algorithms. …”
Get full text
Get full text
Get full text
Monograph -
4
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
6
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
7
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
8
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The initial investigation on the existing LDPC code decoding algorithms assists to develop a low complexity LDPC code decoding algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
10
Study of optimal EG placement in radial distribution system using real coded genetic algorithm
Published 2011“…This paper proposes a study of embedded generation (EG) placement in radial distribution system by utilizing real coded genetic algorithm (RCGA) technique. Several cases of EG models placements are studied in order to minimize the total power losses and to improve voltage profiles of the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…One of the alternatives is by replacing it with cheaper adder and shifter to compute the same result. The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
12
-
13
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…For most of the cases of the shortest route finding, the Dijkstra's algorithm is known to be an optimal search algorithm. …”
Get full text
Get full text
Thesis -
14
A new real coded genetic algorithm crossover: Rayleigh crossover
Published 2014Get full text
Get full text
Get full text
Article -
15
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator: article
Published 2010“…This new technique is been develope in order to overcome these problem. The Verilog HDL coding is been written using Quartus 2 version 9.1. …”
Get full text
Get full text
Article -
16
-
17
Development of a scalable video compression algorithm
Published 2012“…In this paper a rate distortion optimized video frame dropping strategy which can be applied on active network nodes during high traffic intensity for H.264/AVC was developed. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
Published 2013“…On such limited device, a high quality speech compression for Quranic recitation is favorable. In this paper, we developed a high quality speech compression for Quranic recitation by modifying Code Excited Linear Prediction (CELP) algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
20
Optimizing optimal path trace back for Smith-Waterman algorithm using structural modelling technique
Published 2012“…Therefore, the second design is the best approach in optimizing the optimal path trace back for Smith Waterman algorithm. …”
Get full text
Get full text
Student Project
